Due to a party's violation of his obligations or responsibilities indicated in the contract, many engineering projects confront extensive contractual disputes, which in turn need arbitration or other forms of dispute resolution, which negatively impact the project's outcome. Each contract has its terms for dispute resolution. Therefore, this paper aims to study the provisions for dispute resolution according to Iraqi (SBDW) and the JCT (SBC/Q2016) and also to show the extent of the difference between the two contracts in the application of these provisions. The methodology includes a detailed study of the dispute settlement provisions for both contracts with a comparative analysis to identify the differences in the application of these provisions between the two contracts. The research results revealed several differences, the most important of which is that the engineer has a dual role in Iraqi (SBDW). On the one hand, he is appointed by the employer to carry out specific duties under the contract. On the other hand, the engineer also has powers related to the settlement of claims and this first level of conflict avoidance between the two parties, Unlike the SBC/Q2016 contract, which appoints a neutral third party to mediate the problem. In addition, resolving disputes between the two parties, according to the Iraqi (SBDW), needs a long time compared with JCT-SBC/Q2016.
Cryptography is the process of transforming message to avoid an unauthorized access of data. One of the main problems and an important part in cryptography with secret key algorithms is key. For higher level of secure communication key plays an important role. For increasing the level of security in any communication, both parties must have a copy of the secret key which, unfortunately, is not that easy to achieve. Triple Data Encryption Standard algorithm is weak due to its weak key generation, so that key must be reconfigured to make this algorithm more secure, effective, and strong. Encryption key enhances the Triple Data Encryption Standard algorithm securities. This paper proposed a combination of two efficient encryption algorithms to
... Show MoreBackground & objective: Difficult intubation remains a risk for patients undergoing general anesthesia (GA) or mechanical ventilation in an intensive care unit (ICU). Macroglossia is a known factor for difficult intubation. But it is not routine to assess the tongue size to predict difficult intubation. Studies are found deficient in comparing usefulness of measuring thyromental distance and the tongue thickness (TT) measured by ultrasonography to estimate difficult intubation. We compared tongue thickness measured by ultrasonography and thyromental distance as a means to anticipate difficult intubation. Methodology: A convenient sample of 60 patients; 32 males and 28 females, who were undergoing elective surgery with GA were i
... Show MoreTraining has occupied a leading position in a large number of developed and developing countries alike in order to develop the skills of workers in line with the changes and developments of the era, including monitoring compliance in banks, which is one of the most important jobs in banking work to trailing and monitor the bank’s compliance with laws, regulations and instructions in order to achieve its goals Therefore, the problem of this research focuses on the following question: What is the role of training in enhancing banking compliance at the present time? In order to clarify the relationship between the main and sub-research variables, two main hypotheses and three sub-hypotheses were formulated for each hypothesis, and t
... Show MoreFocusing on the negative role of default risk on banks, as it is one of the most important risks facing banks, which are difficult to determine accurately, and its reflection on the indicators of profitability of cash flows. The increasing competition between banks led to an increase in the credit facilities granted by banks, and was accompanied by an increase in exposure to the risks of default, which led to an impact on the level of performance of banks in terms of achieving the required return according to the levels of high competition. Therefore, the problem of this study focused on the extent to which the risk indicators of default affect the profitability indicators of the cash flows of the banks research sample in the profit
... Show MoreThis research amid to measure the impact of organizational flexibility (structural flexibility, operational flexibility, and strategic flexibility) in achieving organizational prosperity and its dimensions (strategic agility, intellectual capital, innovation and sustainable competitive advantage) in a number of Iraqi cellular communications companies. The research adopted descriptive analytical approach. A sample of (85) persons from the research community was selected, which included (Department managers, Directors administrative units, Communication engineers), to answer the questionnaire prepared for this purpose. And to analyze data and derive results. Statist
... Show MoreTransport layer is responsible for delivering data to the appropriate application process on the host computers. The two most popular transport layer protocols are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP is considered one of the most important protocols in the Internet. UDP is a minimal message-oriented Transport Layer protocol. In this paper we have compared the performance of TCP and UDP on the wired network. Network Simulator (NS2) has been used for performance Comparison since it is preferred by the networking research community. Constant bit rate (CBR) traffic used for both TCP and UDP protocols.
In this study, we review the ARIMA (p, d, q), the EWMA and the DLM (dynamic linear moodelling) procedures in brief in order to accomdate the ac(autocorrelation) structure of data .We consider the recursive estimation and prediction algorithms based on Bayes and KF (Kalman filtering) techniques for correlated observations.We investigate the effect on the MSE of these procedures and compare them using generated data.
Through recent years many researchers have developed methods to estimate the self-similarity and long memory parameter that is best known as the Hurst parameter. In this paper, we set a comparison between nine different methods. Most of them use the deviations slope to find an estimate for the Hurst parameter like Rescaled range (R/S), Aggregate Variance (AV), and Absolute moments (AM), and some depend on filtration technique like Discrete Variations (DV), Variance versus level using wavelets (VVL) and Second-order discrete derivative using wavelets (SODDW) were the comparison set by a simulation study to find the most efficient method through MASE. The results of simulation experiments were shown that the performance of the meth
... Show MoreThe purpose of the study is to identify the need to improve health services in Iraq by determining the efficiency of service in health care centres and working on exploiting limited resources through choosing the most efficient technological art represented by using precast concrete technology to fill the shortfall in the establishment health centres for primary care and to explain the impact of this on saving resources, time, and increasing production efficiency. To achieve this, the quantitative analysis adopted as a methodology in the study by determining the size of the deficit in the infrastructure of health centres for primary care according to the standard of a he
... Show More